Yahoo Answers is shutting down on May 4th, 2021 (Eastern Time) and beginning April 20th, 2021 (Eastern Time) the Yahoo Answers website will be in read-only mode. There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page.
Trending News
how can you get rid of viruses and trojans for free?
i have critical viruses and trojans i need a software to get rid of them forever !!!!!!!!!!!!!!!!!!!!!
11 Answers
- ilknur KLv 71 decade agoFavorite Answer
Follow this instructions to Remove viruses and trojans for free in you Computer.
Restart You Computer Safe Mode with Networking
1. Log out and reboot your machine.
2. When the machine starts the reboot sequence, press the F8 key repeatedly.
3. Select Safe Mode with Networking from the resulting menu.
4. Login. If the malware has changed your password, try logging in as
Administrator. By default, Administrator has no password.
5. The machine will continue booting, but the Windows desktop will look different.
Then in The Safe With Networking .Download by using Rkill press here http://www.bleepingcomputer.com/forums/topic308364...
Download and Scan By Using Malwarebytes’ Anti-Malware http://download.cnet.com/Malwarebytes-Anti-Malware...
Download and Scan By Using Super Anti-Spyware Press here http://www.superantispyware.com/
Download ATF is a new, freeware, temporary file cleaner for Windows, IE, Firefox and Opera with a simple, easy-to-use interface.
The main screen allows the user to either clean all temporary files, or select files for cleaning. The program also knows if Firefox and or Opera is being used, and gives the option of cleaning the temporary files associated with those applications.
ATF Cleaner provides the user with a window showing the total bytes freed upon completion. The program is small (36kb), quick to run and no installation required. to Download ATF Cleaner press this link http://download.cnet.com/ATF-Cleaner/3000-18512_4-...
Download and Scan By using
Remove Fake Antivirus 1.64 press here http://www.softpedia.com/progDownload/Remove-Fake-...
After Finish Scan and Remove all viruses and trojans ,Restart you Computer to be Normal.
Then
Download and Scan again By using Norman Malware Cleaner Press here http://www.norman.com/support/support_tools/58732/... This is to make sure you Virus, Malware, Trojan, Worm,
Rogue Fake Anti-Virus, Hijack Web Browser, Pop up Advertisements,
Rootkit and Spyware it is not on you Computer Forever.
Please give me the feedback and Rate Me
- 1 decade ago
Here you go, download it, install it, run it. http://www.microsoft.com/security_essentials/
The viruses/trojans may block the install because the makers of these things are jerks. If that is the case the only way to get rid of what is on your system now is to reinstall Windows. Back up files that you can not replace to external storage, just remember that whatever you have will most likely jump onto the external storage and will try to automatically run when stuck into another computer so be wary! If you have a computer from a major manufacturer you should have a Reinstall disc or a recovery partition on your computer. Most computers allow you to access the recovery partition by hitting F11 or F12 while you are at the very first screen that comes up when you turn your computer on.
Or you could use a real operating system like Linux. www.ubuntu.com
- 1 decade ago
Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse itself.
Operations which could be performed by a hacker on a target computer system include:
Use of the machine as part of a Botnet (e.g. to perform Distributed Denial-of-service (DDoS) attacks)
Data Theft (e.g. passwords, security codes, credit card information)
Installation of software (including other malware)
Downloading of files
Uploading of files
Deletion of files
Modification of files
Keystroke logging
Viewing the user's screen
- How do you think about the answers? You can sign in to vote the answer.
- Ed GLv 71 decade ago
You can go to this link I'm giving you and get free help at the forms. You can also get information on how to remove certain threats. Depending on what you are infected you may have to do a little work.
- Anonymous1 decade ago
I like avast!.
By the way, it is always typed as "avast!". Always lowercase and with the exclamation mark. Even at the beginning, in the middle, or at the end of sentences. Got it? Good.
- Anonymous1 decade ago
Here is a simple solution for you:
- 1 decade ago
I use malwarebytes, SuperAntiSpyware, and SpyBot search and destroy. Also rkill.
http://www.filehippo.com/download_ccleaner/
http://www.filehippo.com/download_spybot_search_de...
(rkill)
Source(s): Comluter Tech